______________________________________________________________________ Mandrake Linux Security Update Advisory ______________________________________________________________________ Package name: ethereal Advisory ID: MDKSA-2003:051 Date: March 24th, 2003 Affected versions: 9.1 ______________________________________________________________________ Problem Description: A vulnerability was discovered in Ethereal 0.9.9 and earlier that allows a remote attacker to use specially crafted SOCKS packets to cause a denial of service (DoS) and possibly execute arbitrary code. A similar vulnerability also exists in the NTLMSSP code in Ethereal 0.9.9 and earlier, due to a heap-based buffer overflow. ______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0081 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0159 http://www.ethereal.com/appnotes/enpa-sa-00008.html ______________________________________________________________________ Updated Packages: Mandrake Linux 9.1: 0305a98a99d02249cf4394e0813530ce 9.1/RPMS/ethereal-0.9.11-1.1mdk.i586.rpm 10959548f2d2b3b0b8098669511611bb 9.1/SRPMS/ethereal-0.9.11-1.1mdk.src.rpm Mandrake Linux 9.1/PPC: b1a6d31b7bae110678b4715e0e83a042 ppc/9.1/RPMS/ethereal-0.9.11-1.1mdk.ppc.rpm 10959548f2d2b3b0b8098669511611bb ppc/9.1/SRPMS/ethereal-0.9.11-1.1mdk.src.rpm ______________________________________________________________________ Bug IDs fixed (see https://qa.mandrakesoft.com for more information): ______________________________________________________________________ To upgrade automatically, use MandrakeUpdate. The verification of md5 checksums and GPG signatures is performed automatically for you. If you want to upgrade manually, download the updated package from one of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm". A list of FTP mirrors can be obtained from: http://www.mandrakesecure.net/en/ftp.php Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig <filename> All packages are signed by MandrakeSoft for security. You can obtain the GPG public key of the Mandrake Linux Security Team from: https://www.mandrakesecure.net/RPM-GPG-KEYS Please be aware that sometimes it takes the mirrors a few hours to update. You can view other update advisories for Mandrake Linux at: http://www.mandrakesecure.net/en/advisories/ MandrakeSoft has several security-related mailing list services that anyone can subscribe to. Information on these lists can be obtained by visiting: http://www.mandrakesecure.net/en/mlist.php If you want to report vulnerabilities, please contact security_linux-mandrake.com Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team <security linux-mandrake.com>
Mandrake Linux Advisory: ethereal
By
Get the Free Newsletter!
Subscribe to Developer Insider for top news, trends, & analysis